This masterclass introduces Experience Level Agreements (XLAs) and uses interactive studies and exercises to nail down the concept of XLA, setting attendees on a solid path beyond ITIL, SLAs, and KPIs into a new perspective of XLAs and performance outcomes.
In the rapidly evolving world of technology, AI's prowess in software licensing and cloud subscriptions is transforming business landscapes. But, like any powerful tool, it comes with its own set of challenges.
To operate without formal change and release management capabilities in place risks regular service disruption and adverse impacts to business operations. Instead, attend this event and learn how to minimise risk, reduce service outages, and increase efficiency across IT and business operations.
Modern higher education institutions are complex bodies with numerous departments, student groups, administrators, shared services and alumni organisations sharing hundreds of applications and legacy systems. This can result in inconsistent service experience across campus, longer wait times, lower CSAT and user dissatisfaction, compounded by funding issues and competitive pressures.
In this session, the CoP will explore the exciting deliverables the community hopes to achieve, share some exciting news and discuss potential opportunities for the group.
Discover how to create a flexible major incident process that restores service as quickly as possible; what you need to be doing in order to avoid stress and chaos, and effectively deal with any major incident that arises; plus much more in our dedicated Major Incident Management masterclass.
Join us for an introduction to Knowledge-Centred Service (KCSĀ®) - an emerging best practice for knowledge management that integrates the creation and maintenance of knowledge into the problem solving process.
IT Asset Management has evolved from an administrative function to a key strategic initiative for the delivery of IT services. From efficient use of IT budgets and meeting compliance obligations to providing a solid foundation for Information Security, IT Asset Management is an essential element of IT Management.
We use cookies to optimise our website and our service.
Functional cookies
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.